Sciweavers

105 search results - page 18 / 21
» Opportunistic Transient-Fault Detection
Sort
View
GLOBECOM
2007
IEEE
15 years 3 months ago
Cognitive Radio Networks: How Much Spectrum Sharing is Optimal?
Abstract—We explore the performance tradeoff between opportunistic and regulated access inherent in the design of multiuser cognitive radio networks. We consider a cognitive radi...
Sudhir Srinivasa, Syed Ali Jafar
ICASSP
2008
IEEE
15 years 3 months ago
Power control in spectrum overlay networks: How to cross a multi-lane highway
—We consider power control in spectrum overlay networks (also referred to as opportunistic spectrum access) where secondary users identify and exploit instantaneous and local spe...
Wei Ren, Qing Zhao, Ashwin Swami
USENIX
2007
14 years 11 months ago
Implementation and Performance Evaluation of Fuzzy File Block Matching
The fuzzy file block matching technique (fuzzy matching for short), was first proposed for opportunistic use of Content Addressable Storage. Fuzzy matching aims to increase the ...
Bo Han, Peter J. Keleher
CEAS
2008
Springer
14 years 11 months ago
A Survey of Modern Spam Tools
Over the past 5 years, spam sending technology has improved dramatically. Static messages sent opportunistically through misconfigured hosts have evolved into dynamically generate...
Henry Stern
SIGIR
2009
ACM
15 years 4 months ago
Detecting spammers and content promoters in online video social networks
A number of online video social networks, out of which YouTube is the most popular, provides features that allow users to post a video as a response to a discussion topic. These f...
Fabrício Benevenuto, Tiago Rodrigues, Virg&...